Rock Phish Analyse

IOB - Indicator of Behavior (21)

Chronologie

Langue

en8
pl4
it4
de4
ru2

De campagne

us22

Acteurs

Activités

Intérêt

Chronologie

Taper

Fournisseur

Produit

Russcom Network Loginphp2
Pligg2
Adobe Acrobat Reader2
Apple QuickTime2
DZCP deV!L`z Clanportal2

Vulnérabilités

#VulnérabilitéBaseTemp0dayAujourd'huiExpConEPSSCTICVE
1DZCP deV!L`z Clanportal config.php elévation de privilèges7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.70CVE-2010-0966
2Pligg cloud.php sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.59
3Tiki Admin Password tiki-login.php authentification faible8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009362.96CVE-2020-15906
4Dragon Path Bharti Airtel Routers Hardware BDT-121 Admin Page cross site scripting3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000530.04CVE-2022-28507
5SourceCodester Kortex Lite Advocate Office Management System register_case.php sql injection4.74.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.22CVE-2024-3621
6Adobe Acrobat Reader buffer overflow6.35.5$25k-$100k$0-$5kUnprovenOfficial Fix0.295030.02CVE-2014-9159
7Apple QuickTime buffer overflow10.09.5$25k-$100k$0-$5kNot DefinedOfficial Fix0.061130.02CVE-2011-3249
8zephyrproject-rtos RNDIS USB Device buffer overflow7.87.8$0-$5k$0-$5kNot DefinedNot Defined0.000810.03CVE-2021-3861
9Lenze cabinet c520/cabinet c550/cabinet c750 Password Verification Remote Code Execution9.89.6$0-$5k$0-$5kNot DefinedOfficial Fix0.003360.04CVE-2022-2302
10SonicWALL AntiSpam / EMail Security Appliance MTA Queue Report Module reports_mta_queue_status.html cross site scripting8.07.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.02
11Magic Photo Storage Website register.php elévation de privilèges5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.02
12Russcom Network Loginphp register.php cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptUnavailable0.006770.02CVE-2006-2160
13Linux Kernel FXSAVE x87 Register chiffrement faible4.33.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.001010.05CVE-2006-1056
14WordPress wp-register.php cross site scripting4.34.2$5k-$25k$0-$5kHighUnavailable0.003220.00CVE-2007-5105

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDadresse IPHostnameActeurCampagnesIdentifiedTaperConfiance
181.16.131.40Rock Phish19/06/2022verifiedÉlevé
2XXX.XX.XXX.XXXxxx Xxxxx19/06/2022verifiedÉlevé

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClasseVulnérabilitésVecteur d'accèsTaperConfiance
1T1059CAPEC-242CWE-94Argument InjectionpredictiveÉlevé
2TXXXX.XXXCAPEC-209CWE-XX, CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveÉlevé
3TXXXXCAPEC-122CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveÉlevé
4TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveÉlevé
5TXXXXCAPEC-0CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveÉlevé

IOA - Indicator of Attack (15)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTaperConfiance
1File/control/register_case.phppredictiveÉlevé
2Filecloud.phppredictiveMoyen
3Fileinc/config.phppredictiveÉlevé
4Filexxxxxxxx.xxxpredictiveMoyen
5Filexxxxxxx_xxx_xxxxx_xxxxxx.xxxxpredictiveÉlevé
6Filexxxx-xxxxx.xxxpredictiveÉlevé
7Filexxxx/xxxxxxxx.xxxpredictiveÉlevé
8Filexx-xxxxxxxx.xxxpredictiveÉlevé
9ArgumentxxxxxxxxpredictiveMoyen
10ArgumentxxxxxxxxxxpredictiveMoyen
11ArgumentxxxxxxxxpredictiveMoyen
12Argumentxxxxx/xxxx_xx/xxxxxx_xxxx/xxxxx/xxxx_xxxx/xxxx_xxxxx/xxxxx_xxxx/xxxxxxxxxxx/xxxxxxx_xxxx/xxxxxxx_xxxx/xxxxxxxx_xxxxxx/xxxxx_xxxx/xxxxxxpredictiveÉlevé
13ArgumentxxxxxpredictiveFaible
14Argumentxxxx_xxxxxpredictiveMoyen
15Argument_xxxxxx[xxxx_xxxx]predictiveÉlevé

Références (2)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!